Thu, Jan 25 AM Opening 10:40 - 10:45 |
|
10:40-10:45 |
Opening Address ( 5 min. ) |
Thu, Jan 25 AM Session 1 Chair: Yukihiro Togari (NTT Communications) 10:45 - 12:45 |
(1) |
10:45-11:10 |
Discussion of NFC Infrastructure Considering Multi-Tenant Environment Using Software Fault Isolation |
Soki Koizumi (Keio Univ.), Takao Kondo (Hokkaido Univ.), Fumio Teraoka (Keio Univ.) |
(2) |
11:10-11:35 |
A Semi-Automatic Network Configuration Discovery Method for a Network Information Sharing Platform KANVAS |
Kosuke Mori (Keio Univ.), Takao Kondo (Hokkaido Univ.), Fumio Teraoka (Keio Univ.) |
(3) |
11:35-12:00 |
Dealing with Interest replay attack in Information-Centric Networking based Wireless Sensor Networks |
Takafumi Taya, Osamu Mizuno (Kogakuin Univ.) |
|
12:00-12:45 |
Lunch Break ( 45 min. ) |
Thu, Jan 25 PM IA Workshop - Keynote address Chair: Toyokazu Akiyama (Kyoto Sangyo Univ.) 12:45 - 13:45 |
(4) |
12:45-13:45 |
[Keynote Address]
Thoughts on Network Data Analysis |
Kenichi Yoshida (Univ. of Tsukuba) |
Thu, Jan 25 PM IA Workshop - Invited talks Chair: Toyokazu Akiyama (Kyoto Sangyo Univ.) 13:45 - 14:55 |
(5) |
13:45-14:15 |
[Invited Talk]
Practical and Evaluation Framework for DevSecOps |
Sinchai Kamolphiwong, Chidchanok Choksuchat, Suthon Seawong Touchai Angchuan, Thanatip Limna, Chinnapong Angsuchotmetee, Thossaporn Kamolphiwong, Raweewan Lowtungjittrong, Songkrant Muneenaem, Nattawut Wichit, Ponpitak Santipaptawon, Sirima Saehia, Kanokgul Saelim, Sasithorn Kongnoo, Supranee Ubonjinda, Thichaluk Chotkaew, Duangthida Choomalee, Siwipa Pruitikanee, Nattaya Chamtitigul (PSU) |
(6) |
14:15-14:45 |
[Invited Talk]
AI@Security - Security Threats and Smart Technology |
Jiann-Liang Chen (NTUST) |
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Jan 25 PM IA Workshop - Short presentations Chair: Ryohei Banno (Kogakuin Univ.) 14:55 - 16:10 |
|
- |
IA Workshop - short presentations of posters |
|
15:55-16:10 |
Break (Preparation for poster session) ( 15 min. ) |
Thu, Jan 25 PM IA Workshop - Poster session 1 Chair: Ryohei Banno (Kogakuin Univ.) 16:10 - 16:40 |
(7) |
16:10-16:40 |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria |
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) |
(8) |
16:10-16:40 |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- |
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) |
(9) |
16:10-16:40 |
[Poster Presentation]
Automated Electronic Strike Zone and Pitch Trajectory Overlay System Based on AI computer vision |
Lin Wang, Bor-Yao Tseng, Hung-Tse Chiang, Jiann-Liang Chen (NTUST), Han-Chuan Hsieh (TISS) |
(10) |
16:10-16:40 |
[Poster Presentation]
Fluid-based Modeling of TCP BBR Congestion Control Mechanism |
Shota Inoue, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
(11) |
16:10-16:40 |
[Poster Presentation]
A Study on Estimating Hamming Weight of CRC with Machine Learning |
Taichi Emi, Han Nay Aung, Yasuhiro Yamasaki, Hiroyuki Ohsaki (Kwansei Gakuin Uni.) |
(12) |
16:10-16:40 |
[Poster Presentation]
A Study on Reinforcement Learning-Based Window Flow Control with Heterogeneous Utility Function |
Yuta Takesada, Han Nay Aung (KG), Ryo Nakamura (FU), Hiroyuki Ohsaki (KG) |
Thu, Jan 25 PM IA Workshop - Poster session 2 Chair: Ryohei Banno (Kogakuin Univ.) 16:40 - 17:10 |
(13) |
16:40-17:10 |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- |
Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) |
(14) |
16:40-17:10 |
[Poster Presentation]
Dust Forecasting using ARIMA and ARIMAX Models |
Nuntouchaporn Prateepausanont (College of digital science, Prince of Songkla Univ.), Anny Mardjo (Prince of Songkla Univ. , Trang Campus), Chidchanok Choksuchat, Korakot Wichitsa-nguan Jetwanna, Thanathip Limna (Prince of Songkla Univ.) |
(15) |
16:40-17:10 |
[Poster Presentation]
Study on the Effectiveness of Building TCP Throughput Prediction Model using Federated Learning |
Han Nay Aung, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
(16) |
16:40-17:10 |
[Poster Presentation]
Study on Routing Schemes Using Reinforcement Learning with Cooperation for IoT Applications |
Takahashi Shotaro, Inoue Shota, Ohsaki Hiroyuki (Kwansei Univ) |
(17) |
16:40-17:10 |
[Poster Presentation]
Cross-Layer Security Design Considerations for the Latest In-Vehicle Network Architecture |
Toyokazu Akiyama (Kyoto Sangyo Univ.) |
(18) |
16:40-17:10 |
[Poster Presentation]
Robustness of Random Walk on a Graph against Adversary Attacks |
Hiroki Kawamura, Satoshi Shiina, Han Nay Aung, Hiroyuki Ohsaki (KG) |
Thu, Jan 25 PM Closing 17:10 - 17:25 |
|
17:10-17:20 |
Awards Ceremony ( 10 min. ) |
|
17:20-17:25 |
Closing Address ( 5 min. ) |